Katie’s Krops Redesigned Website

Redesigning Katie’s Krops Website 

Here at ADVYON, we are very lucky to work with local nonprofits. One nonprofit we have worked with for about 10 years now, is Katie’s Krops.

Katie Stagliano, who was 9 years old at the time and had grown a 40-pound cabbage, founded Katie’s Krops. After giving the cabbage to a nearby soup kitchen and feeding over 270 people with it, she came to the realization that growing more veggies and herbs could enable her to continue to assist others.

We got into the organization and the fun that we could have with this website since we were so eager to work with Katie and her nonprofit. We made the decision to arrange the home page and menu to follow the course of the vegetables in order to ensure that the story was understandable.

Join us as we walk through some of the design ideas for the new Katie’s Krops website we just completed.

Additionally, visit the website to view each page that was created at https://katieskrops.com

Katie's Krops Website Redesign

What to Do After a Cyberattack

Written By Tibby Fielding

If your organization experiences a cyberattack, it is vital to react quickly and immediately enable your incident response plan. Your response plan should include the following tasks which help ensure the incident is suppressed to reduce a loss in data. You will need to access and contain the attack, remove the threat, restore data and services, report the incident, and revise your incident response plan. Read the following to learn about the steps that should be taken after a cyberattack.

    1. Assess the attack: Your security team needs to determine the extent of the attack and identify which systems, users, and data have been affected. 
    2. Determine the type of attack: Phishing attacks, ransomware, Denial of Service attacks, and malware are common cyberattacks. If malware is downloaded, identify the type to glean a better understanding of the scope of the attack. 
    3. Identify the source of the attack: Understanding the source of the attack will allow your organization to improve its response and security. Threat actors may have breached other areas of your network that have yet to be discovered. 
    4. Assess the damage: determine which systems and data have been compromised. What is the impact of this attack? Evaluating this information will aid in future prevention. 
    5. Contain the attack: Isolate any systems or devices that have been compromised from the network to prevent spreading.
    6. Disconnect from the network: turn off your wifi/disconnect from the network from affected devices, and shut down affected devices and services (email, web servers).
    7. Remove the threat: remove malware and any other malicious software. 
    8. Patch exploited vulnerabilities: This may require downtime from business operations, but it is essential to prevent further damage from future attackers. You may need to update software, reconfigure network settings or replace outdated software and systems. 
    9. Reset passwords and turn on Multifactor Authentication (MFA): If any user accounts have been compromised, reset passwords and ensure the use of MFA. 
    10. Restore data and service: after the attack has been alleviated, damaged/lost data needs to be restored from clean backups and systems need to be manually rebuilt or restored using recovery software. 
    11. Report the incident: Create an incident report that outlines the damages and how the attack was handled and alleviated. Follow state laws or regulations that are legally mandated to report cyberattacks and data breaches. If you manage, store or transmit personal information, you are required by HIPAA and PCI-DSS to notify all accepted individuals. 
    12. Update your Response plan: learn from the attack and create an updated response plan that improved company security. Identify any mistakes or lessons learned front the attack.

The growing risk of cyber attacks from threat actors is affecting businesses of all sizes and in all industries. Ensuring you have a plan in place to respond to cyber threats that fit your business’s needs is vital. While cyber risk cannot be eliminated completely, enterprises can manage risk effectively with the right people, processes, and technology.

Do you need help advancing your existing incident response plan into one that is more secure and advanced? Contact ADVYON today for a lasting partnership and see how we can help identify your organization’s risks and resolve them quickly and efficiently. ADVYON is more than just an IT company, we are great at assessing, identifying, and aligning business and technology solutions to complement our client’s strategic objectives, growth, project goals, culture, people, and processes.


Why It’s Important To Be HIPAA Compliant

Written By Tibby Fielding

One way to help build trust between patients and healthcare professionals is through HIPAA compliance. Patients can feel more confident in their doctors which leads to better healthcare. The Health Insurance Portability and Accountability Act (HIPAA) is a federal law that was created to protect the privacy of individuals’ health information. It also sets standards for the security of electronic health information. As technology has advanced, so have threats to the security of protected health information (PHI). Cybersecurity is a critical component of HIPAA compliance and is essential for protecting the privacy of individuals’ health information. HIPAA compliance focuses on the privacy of patient data but does not address the security of the data. Cybersecurity measures and IT professionals are necessary for protecting healthcare data from unauthorized access, malicious attacks, and data breaches. These security specialists can implement measures such as encryption, firewalls, and access controls to protect patient data. They also monitor the network for suspicious activity.

The penalties for HIPAA violations can be severe, especially when combined with a network security breach. The Department of Health and Human Services (HHS) Office for Civil Rights (OCR) is responsible for enforcing HIPAA and can impose penalties for violations ranging from $100 to $1.5 million per year. These penalties can be detrimental to healthcare providers. Combined with a security breach, millions of dollars in damages, and leaked sensitive data, healthcare providers face a growing threat to their security.

Rethinking Your Approach To Cyber Risk Management

Healthcare has changed to serve both on-site and remote patients. To safeguard data and practice system management for protected health information (PHI), a holistic and comprehensive approach to cybersecurity that meets HIPAA compliance and HIPAA Security Rule Standards is necessary. Consider the following practices when planning for cyber risk management.

Administrative Safeguards:

  • Implement access control measures such as multi-factor authentication, two-step verification, and monitoring user activity.
  • Regularly update passwords and secure user account privileges with appropriate clearances.
  • Secure networks and computers by installing a comprehensive security solution that includes firewalls, malware protection, antivirus software, and continual monitoring.
  • Conduct employee security training sessions to teach employees about the importance of healthcare data privacy and security best practices.
  • Perform regularly scheduled backups of your data, and have emergency plans in place.

Physical Safeguards:

  • Secure premises by installing locked doors, motion detectors, and security cameras.
  • Restrict access to workstations, utilize physical barriers around protected information, and operate with ID keycard access.
  • Technical Safeguards:

Access Control:

  • This involves verifying and authorizing user access to PHI. It can be accomplished with passwords, personal identification numbers, and biometric identification.
  • Automatic Logoff: Establish procedures that terminate an electronic session after a predetermined time of inactivity.
  • Audit Controls: Implement hardware, software, and procedural mechanisms to record and examine access and other activity.
  • Integrity Controls: Implement measures to ensure that PHI is authenticated and is not improperly altered or destroyed.
  • Transmission security: Regulate the controls for encryption, and provide safeguards against unauthorized access of PHI during transmission.

Do you need help advancing your existing risk management program into one that is more holistic and includes a whole-systems approach? Contact ADVYON today for a lasting partnership and see how we can help identify your organization’s risks and resolve them quickly and efficiently. ADVYON is more than just an IT company, we are great at assessing, identifying, and aligning business and technology solutions to complement our client’s strategic objectives, growth, project goals, culture, people, and processes.

Tech Tips For Traveling During The Holidays

The Holiday season is upon us, and it is an exciting time for traveling, new purchases, and quality time with loved ones. Unfortunately, this time of year we see an uptick in theft and loss of devices. The ADVYON team wants to help you stay safe and secure during the hustle and bustle. We have put together a list of recommendations that will help keep your mind at ease and your devices and data secure before, during, and after travel. 

Before Traveling:

  • Take pictures of the devices you will travel with (phones, laptops, cameras, tablets, iPads, headphones, handheld gaming devices etc.).
  • Write down all serial numbers for your devices and store them both at home and keep them with you while traveling.
  • Backup all your devices to the cloud (If a device is lost or stolen, you will not lose all of your data).
  • Set up ‘Find My” on your devices to track their location.
  • Keep all logins secure by setting up multi-factor authentication.
  • Pre-download tv shows, movies, games, and music to your devices ahead of time so you do not need to access insecure public wi-fi. 
  • Pre-charge all devices.
  • Pack any chargers/cords, portable chargers, adapters, and batteries you will need.

While Traveling:

  • Create an internet plan: 
    • Use your cell phone hotspot, purchase a secure internet plan from your phone provider for travel, or utilize a VPN.
    • Use a traveling VPN application: These will protect your devices so your data is not tracked.
    • Don’t use public WIFI networks or hotspots without a VPN. Connecting to these insecure networks makes your data vulnerable.
  • Public WIFI Tip: The WIFI at airports/hotels costs money to log in, you can use it by adding “?.jpg” at the end of the URL address but be sure to use a VPN app for protection.
  • Always lock your valuable technology in a safe.

After Traveling: 

  • Take an inventory of your devices 
  • Backup your devices

For more information and insights about traveling with technology, listen to the podcast hosted by our ADVYON tech dads: Brian and Jon.

AskTechDad Episode #7- Holiday Travel Tips

Podcast episodes for AskTechDad are available on all major streaming platforms: Spotify, Audible, Apple etc. 

How to fix errors when installing and uninstalling programs on Windows (sometimes including code 2502 or 2503):

Written by Ian Britten and Tibby Fielding

Are you having issues when installing and uninstalling programs on your Windows computer?

Sometimes, but not always, you may receive error messages that contain the code 2502 or 2503. A Windows computer has a built-in Windows account called Trusted Installer which assists in installing, modifying and removing updates and other Windows components. Over time your computer can become corrupted which causes the Trusted Installer to lose some of its access to the Temp Folder which holds temporary files used during installation. This can cause programs to stop installing or uninstalling all together.

To fix these issues, follow the steps below:

Step 1:

In the search bar type ‘cmd.’

Next, from the menu, right click ‘Command Prompt App’ and select ‘Run as administrator.’ 

Click ‘yes’ to the pop up.

Step 2:

Copy and paste the following commands in the command prompt box and press the ‘Enter’ key:

TAKEOWN /F C:\Windows\Temp /R

Icacls C:\Windows\Temp /Q /T /C /RESET

Step 3:

Open ‘File Explorer.’

Navigate to C:\Windows\Temp.

Right click the ‘Temp folder.’  and select ‘Properties.’

Step 4:

From the ‘Properties’ menu, select the ‘Security’ tab.

At the bottom of the Security Tab, select “Advanced.’

Step 5: 

At the top of the window, next to ‘Owner:’, select Change.

Step 6:

In the Advanced Security Settings Window, press the button named ‘Locations…’.

Step 7:

In the Locations window, select your device name under ‘Location:’.

Select’ OK’

Step 8:

In the textbox, ‘Enter the object name to select’ type: NT Service\TrustedInstaller

Next, select ‘Check Names’.

Step 9:

Once TrustedInstaller displays (with underline), select ‘OK’.

Step 10:

At the bottom of the Advanced Security window, click ‘Apply’ to set TrustedInstaller as owner.

 When you are finished giving Trusted Installer the access it needs, you should not have further issues installing or removing programs.

Are you getting pop ups when composing or replying to emails in Gmail?

Written By Ian Britten and Tibby Fielding

Are you receiving this pop up when composing or replying via Gmail?

This pop up is occurring because your Gmail signature contains images that have been copied and pasted into the signature. To fix this issue, you can insert image files into your signature. If you do not have the image files, there is an easy way to download them.

(Skip to Step 3 if you already have the image files saved on your device.) 

To download image files:

Step 1: Compose a new email and click the X on the loading box that pops up (exit out of the pop up).

Step 2: Right click on the images in your signature and click “Save as” to save them to your device.

Step 3: Delete the image(s) from your signature.

Insert the image(s) back into your Gmail signature: 

Step 4: Click on the Settings Gear > and choose the “See all settings” button.

Step 5: Select:  General Settings > Select Signature > Select the pencil button to edit the signature. Within the Signature textbox, >Select the “Insert image” button.

Step 6: Find the images that you saved on your device from your signature and select these files.

QuickBooks Payment Notifications Not Sending

Written By: Tamra Dubis and  Tibby Fielding 

QuickBooks customers should receive emails that show when a client processes a payment; However, since the end of July, QuickBooks customers have not been getting payment notification emails.

QuickBooks payment notification emails look like the image below:

Our IT technician dug deep into this issue to find a resolution, yet one is not currently available, and it has been deemed a back-end engineering issue. Take a look below to see all the steps our IT Technician took, including guidance from QuickBooks customer service. Hopefully, this will save you troubleshooting time until the issue is resolved.


  1. ADVYON contacted QuickBooks customer support and they gave the link below to fix this issue:

The article is titled: “Unable to receive Intuit email from QuickBooks Payments”



  1. Our IT tech followed all the steps in this article as shown below:

Step 1: Check Email folders, including spam and junk

Step 2: Add the following email addresses to your contact list

Step 2 did not work, so they tried Step 3.

Step 3­­: Turn off the Sender ID filtering for all Server Hostnames/IP Addresses

Unfortunately, the steps in this article provided by QuickBooks Customer Service did not work.


  1. Next, ADVYON’s IT Technician found another support article after searching “QuickBooks not sending notifications”


This article directs you to log into QuickBooks online account for QuickBooks desktop and make changes to the account settings and alerts. See the image below. ADVYON’s IT technician tried all steps on this QuickBooks support page with no resolution.

4. Next, our IT tech reached out to QuickBooks customer service again, the support representative said they would contact a higher tier of support to find out the issue. Through this exchange, we discovered that this is an ongoing backend issue at QuickBooks. Per the conversation below, the issues should have been resolved with the September 2, 2022 update. While QuickBooks has not updated its website to reflect the issue, the support representative clearly stated that the engineering department will have to fix the issue.


As of September 21, 2022, the issue still has not been resolved.

How to solve issues connecting to SharePoint on the Microsoft Edge browser

Written By: Ian Britten and  Tibby Fielding 

There is an issue with Microsoft Edge and Java if you are using a later version of both.  This problem can cause SharePoint to show an error that says “Undefined global this,” which means it cannot reach the website. If the browser does not have the right versions of Microsoft Edge and Java to reach a website, it will not connect and it will produce an error message. 

To fix this issue:

Download the latest version of Microsoft Edge. You do not need to uninstall anything; Microsoft Edge will reinstall over the older version

  1. Click this link to update Microsoft Edge: https://www.microsoft.com/en-us/edge
  2. Choose your OS from the drop-down menu
  3. Next, download the latest version of Java. You do not need to uninstall anything; Java will update to the latest version. 
  4. Click this link to install the latest version of Java: https://www.java.com/en/download/
  5. Choose the green “Download Java” button

This fix should cure any roadblocks accessing SharePoint through Microsoft Edge.  



How to call and message with Amazon Alexa

Did you know you can use Alexa to call and message others?

Amazon’s Alexa calling and messaging feature enables you to make and receive calls, as well as send messages between Echo devices, the Amazon Alexa app for iOS and Android, and fire tablets. It’s a neat way to contact family and friends. The best part? The feature is completely free to use, as it works over Wi-Fi on most Echo devices and into Alexa apps too.

Here’s everything you need to know about it and how it works:

You need an Amazon account and the Alexa app on a device running Android 6.0 (or higher), iOS 11.0 (or higher), or an Android Fire tablet. Everything must be set up using the Alexa app, where you’ll find the Communicate tab.

Once you’ve set it up via the Alexa app, you’ll be able to use the service across all your Echo and Alexa devices, as long as it’s enabled on each individual device – which it is by default.

You can sync the Alexa app with your contacts on your smartphone and this will allow Alexa to call phone numbers, meaning you can call from your Echo to a mobile phone, for example. Alternatively, you can use Alexa to call other Echo devices that your contacts have. If you don’t sync your contacts, you can only use it to contact other Echo or Alexa devices that you’re signed into – like an intercom system.

To get started with Alexa calling for the first time, you need to sign up for it:
1. Open the Amazon Alexa app (on your compatible iOS or Android phone).
2. Open the Communicate tab from the bottom menu.
3. Follow the on-screen instructions to enter and verify your phone information.
Alexa uses your phone’s address book to find people you know who have the Amazon Alexa app with Alexa Calling enabled so that you can call them that way, too.

Here are some Alexa commands you can say:
  • Make a call to another Echo device: “Alexa, call [Corey]” or ” Alexa, call my [Family]”
  • Make a call to a mobile or landline number saved to your contacts: “Alexa, call [John’s] mobile” or “Alexa, call [Chris] on his home phone” or “Alexa, call [Brandon] at work” or “Alexa, call [Mom’s] office”.
  • Dial a mobile or landline number: “Alexa, call [number].”
  • Control call volume: “Alexa, turn the volume up / down.”
  • Hang up / end the call: “Alexa, hang up” or “Alexa, end call.”
  • Answer the call: Just say, “Answer.”
  • Ignore the call: Just say, “Ignore.”

How To Increase The Scope Of Your DHCP Server In A Windows Environment

If you have a working DHCP server on a Windows Environment which has run out of IP addresses, you may want to increase the subnet to give more addresses. This article addresses how to increase the scope of your DHCP server without having to redo all of the existing settings in your DHCP server.

Follow these 10 Steps to increasing IP addresses in your Windows Server DHCP without changing excluded ranges or other configurations.

1. Backup Your existing scope. Open your command prompt with elevated privileges and type the following. It will backup your DHCP scope to your Administrator Documents Folder

netsh dhcp server export C:\Users\Administrator\Documents\dhcp_fullbackup.exp all

2. Export your existing DHCP scope to a text document we can edit later. This will be imported after the scope has been removed.

netsh dhcp server dump> C:\Users\Administrator\Documents\dhcp-readable-export.txt

3. Turn off your DHCP Server Service so we can rename the DHCP database files. Go into your services and stop the DHCP server service.

4. Rename the existing DHCP Database Files. Navigate to C:\Windows\System32\DHCP and rename both the dhcp.pat and the dhcp.mdb files to .old

5. Remove the existing scope from the DHCP Server by right clicking the scope and selecting delete. (Breathe, remember you have a backup)

6. Edit your DHCP scope in the dhcp-readable-export.txt in the following areas to your preferences (Change the places in red with your wanted range):
# =====================================
# Add Scope
# =====================================

Dhcp Server \\*yourserverhere* add scope “*ScopeName” “*ScopeName*”
Dhcp Server \\*yourserverhere* Scope set state 1
Dhcp Server \\*yourserverhere* Scope set delayoffer 0

# ==================================================================
# Start Add Ipranges to the Scope, Server *yourserverhere*
# ==================================================================

Dhcp Server \\*yourserverhere* Scope Add iprange
Dhcp Server \\*yourserverhere* scope set napstate Off

7. Save your changes to the dhcp-readable-export.txt you created earlier.

8. Import the dhcp-readable-export.txt file into your DHCP server. Open a command prompt and type the following.

netsh exec C:\Users\Administrator\Documents\dhcp-readable-export.txt

9. Start the DHCP Server Service

10. Go to your DHCP server and refresh, check your scope.

Pro Tip: Check all of your DHCP devices to see if it has received the new subnet. Restart their DHCP client or renew the network configurations of the computers which have not received the new subnet/address

Pro Tip 2: Change any devices which may have a static IP address to have the new subnet, ie servers, printers, etc.